CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Cisco WebEx Network Recording Player and Cisco Webex Player which could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Microsoft Office for Mac, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in watchOS, Safari, iOS, iPadOS, macOS Catalina, and tvOS.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote unauthorized access with elevated privileges on the affected system.



A vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service.



Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



1 2 3 49